A digital forensic investigation

Assignment Help Case Study
Reference no: EM13839989 , Length: 3200 words

Instructions The Case - A Digital Forensic Investigation Plan

Summary:

Impact Financial Services Australia (IFSA) is a specialist provider of high quality, consumer finance services to a global network of customers. It has been operating since 1990 and employs more than 1500 employees worldwide.  IFSA serves more than 5 million customers globally. The company's main office is situated in Melbourne with other branch offices located in all major cities in Australia.

IFSA has invested heavily in information technology for supporting its global business operations and achieving competitive advantages over its competitors. Major investments were made by the company in 2001 but management has lost focus in updating the networks and application infrastructure that supports the business operation in recent years. The network environment between all of IFSA offices is flat and relatively unrestricted. Users from one office can access systems and servers from another office. Workstations and servers are typically UNIX/LINUX-based. Firewalls and network segmentation are implemented poorly throughout the environment. Intrusion detection and logging exist on systems but they are not effectively used.

Last week, one of the employees Richard at the Sydney office went in to work early and when he got connected to his computer, he found that someone was already connected to his computer with several windows opened. As he stared at it, his computer system got disconnected. He then tried to get connected again, but he was logged out. He called the IT manager, who followed a plan for such incidents. This includes disabling Richard's account and examining the server security logs. The IT manager found that the IP address of the computer that was connected to John's computer belongs to a computer used to run a data projector at the Melbourne office. He quickly rang the Melbourne office to check who has used the computer and requested the logs of people who have swiped into the building. He found out that even that machine was compromised. An urgent meeting with the management concluded that security breach has occurred and Forensic team will be set up to investigate this matter and stop reoccurrence of such issues.   As an information security officer, you are asked by the management to investigate to find out the extent of this security breach and Richard's activities, if others are involved, who is affected and whether criminal charges need to be laid. 

Requirements:

Your task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. Assuming all systems are UNIX/LINUX based, this plan should detail following:

  • justify why use of the digital forensic methodology and approach is warranted including appropriate procedures for corporate investigations such as this.
  • describe the resources required to conduct a digital forensic investigation, including skill sets and required tools of the team members.
  • outline an approach for data/evidence identification and acquisition that would occur in order to prepare the auditors for review of the digital evidence.
  • outline an approach and steps to be taken during the analysis phase making the assumption the computer system is a UNIX/LINUX-based computer.
  • make a recommendation on the action that the company needs to take against the offender.

43

Tips for preparing your digital forensics investigative plan

In writing the digital forensics investigative plan, students need to address following points. Do note that points listed below are not exhaustive and need to be considered as helpful tips.

  • Justify a need for digital forensics methodology and consider scope of the case including nature of alleged misconduct leading to consideration of how electronic and digital evidence may support the investigation. The plan should consider how digital forensics differs from other techniques (such as network forensics, data recovery) and detail the overall steps for the systematic digital forensics approach.
  • Consider the required resources and include details regarding preparation plan for evidence gathering (such as evidence forms, types, storage media and containers), forensics workstation and peripherals needed, software/tools for analysis depending on the type of evidence to be gathered including rationale for selected tools, and consideration of team member skills in digital analysis (such as OS knowledge, skills for interviewing, consultation, working as per the needs of the auditing team and understanding of law and corporate policies).
  • Detail the approach for data acquisition including the different types of evidence that can be gathered and their source depending upon the nature of the case and scope of investigation, develop a plan for data acquisition including rationale for selected plan and contingency planning, detail type of data acquisition tools needed including rationale and an outline for the data validation & verification procedures.
  • Provide an outline of the forensic analysis procedures/steps depending upon the nature of evidence to be collected, and detail the validation approach. This can include techniques to counter data hiding, recovering deleted files, procedures for network and e-mail analysis.
  • Prepare a recommendation on the action that the company needs to take against the offender.
  • Table of contents for the investigative plan should consider what to include in report, structure of report, focus or scope of the report including supporting material to be provided and references. This table of contents should include headings and sub-headings pertaining to the aspects addressed in the above dot points.
  • Prepare a professional report with an Executive Summary, a Word generated table of contents, an Introduction, a body of report with proper headings and sub-headings, and a Conclusion.

Reference no: EM13839989

Questions Cloud

Explain how the moves towards smaller deficits : Explain how the moves towards smaller deficits and eventually to budget surpluses and fiscal consolidation could effect: (i) Government debt levels (ii) Interest rates
Innovation and communication presentation : Innovation and Communication Presentation
Determine which lottery i prefer and the risk premium : Suppose my utility function for asset position x is givenby u(x)  ln x.a Am I risk-averse, risk-neutral, or risk-seeking?b I now have $20,000 and am considering the followingtwo lotteries:L1: With probability 1, I lose $1,000.L2: With probability .9..
Determine which model is good : Comprehensive report is required indicating all the steps done and how we determine which model is good. (R or Excel can also be used. But mostly R needs to be done).
A digital forensic investigation : Your task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. Assuming all systems are UNIX/LINUX based, this plan should detail followi..
Though net investment can be positive : What is "though net investment can be positive, negative, or zero, it is impossible for gross investment to be less than zero".
Bottling company case study : Imagine you are a manager at a major bottling company. Customers have begun to complain that the bottles of the brand of soda produced in your company contain less than the advertised sixteen (16) ounces of product.
Explains aggregate savings behavior as a function : [Econometrics] Suppose you are attempting to build a model that explains aggregate savings behavior as a function of the level of interest rates. Would you rather sample during a period of fluctuating interest rates or a period in which interest rate..
Indirect utility function : indirect utility function

Reviews

Write a Review

Case Study Questions & Answers

  From the scenario, prioritize the attributes of golds reling

From the scenario, prioritize the attributes of Golds Reling's brand from the brand map presented in the scenario according to the attributes that you believe would be most important to the new tablet's target market. Provide support for your respons..

  Discuss critically infosys current and future strategy

Discuss critically Infosys current and future strategy. What advice would you give Kris Gopalakrishnan and KShop has resulted in information overload among staff. What operational measures would you suggest to overcome such challenges?

  Review tarmac business case for diversity

Review Tarmac's Business Case for Diversity and the Learning Resources. Think about Tarmac's approach to managing diversity and how it relates to organisational behaviour concepts and human resource processes.

  Enron case shared activity

Enron was the first nationwide natural gas pipeline network in the United States. As the company grew, executives shifted the company's primary focus from energy delivery and infrastructure to investing in the stock market.

  Ebay inc internet success or fairy tale

Read the case study "eBay Inc.: Internet Success or Fairy Tale? "and answer the question below,   Use the 2002 financial statement data to replicate the Meyer's report calculations that illustrate the conclusion based on the 2001 data reached in the ..

  Mintendo game girl case study

Which option delivers the maximum profit for the supply chain: Sandra's plan, Bill's plan, or no promotion plan at all? How does the answer change if a discount of $10 must be given to reach the same level of impact that the $5 discount received?

  Splash soft drinks case study

Splash Soft Drinks Inc. (SSD) has recently achieved sales that exceeded its expectations after it introduced a new beverage that was greatly welcomed by their customers. The company is currently considering opening a new plant to which some of the pr..

  Details of the task using tesco plc

Details of the task Using Tesco plc (www.tesco.com) as a case study, prepare a report of no more than 2,500 words that:

  What are the common manifestations of alcoholic cirrhosis

What are the common manifestations of alcoholic cirrhosis? Which of these are secondary to hepatocellular failure? Which are secondary to portal hypertension?

  Judge the extent to which the marketing plan at just us

From the case study, judge the extent to which the marketing plan at Just Us! is outdated. Propose two (2) ways that Just Us! could improve the customer experience and thus sustain future growth.

  Read natasha kingery case and answer the questions

Read the DATA CASE on pages 126-127 about Natasha Kingery who is considering furthering her education and is seeking financial advice. Determine the interest rate she is currently earning on her inheritance by going to Yahoo!

  Identify the relevant facts of the case study

Imagine you are the financial controller of XYZ Ltd a corporation that is a very large donor to HOHO. You have recently become aware that its TV advertising has resulted in the charity violating the 25% expenditure ratio for its charity drive.    Id..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd